Globally, the internet handles about 71,131 GB of traffic per second, including 2,790,265 emails and 73,849 Google searches per second. How does this concern you?
Your company’s communications (client, vendor, internal) and your employees searching for business-related information help to make up those numbers. And a breach or leak of your business’s data transmitted over the internet could cost you millions.
This raises alarms because, according to a Ponemon Institute survey, 67% of SMBs admitted to being attacked last year. And increases in practices such as bring your own device (BYOD) and remote working only further your cybersecurity risks.
Large businesses with deep pockets may be in a better position (though, not a perfect one) to deploy a range of IT security solutions; small businesses need to be more vigilant.
Even with a limited budget, the least your business should do to stay secure is invest in a virtual private network (VPN) solution. A VPN secures your online activities by encrypting the transmitted data and masking your identity.
In this article, we discuss how VPNs work and their benefits. We’ll also cover the key features of VPN solutions and give some examples of VPN software vendors.
What is a VPN?
A VPN is a secure tunnel for online browsing. The technology helps you establish a secure and encrypted connection over the internet between your device and the server. It masks your device’s identity and encrypts data that your PC or mobile phone pushes out onto the internet.
To better understand how a VPN helps, let’s begin with how your internet browsing looks without a VPN.
Without a VPN, the data you send over the internet (especially to non HTTPS-compliant websites) is out in the open, without much protection. Hackers can see the data that’s in transit and follow the trail to identify and reach your IP address. It may affect you directly if the exposed data is confidential information, such as tender bids or M&A agreements. Indirectly, hackers may compromise your servers or devices to launch cyberattacks.
A VPN secures your internet communications by creating a virtual network. Instead of your requests directly reaching the intended server, a VPN server routes the requests and connects on your behalf. The destination server identifies the VPN server, not you, as the traffic origin.
Your data requests are encrypted by VPN software even before your internet service provider (ISP) receives them, ensuring that hackers or malware can’t read your information.
The reasons you need a VPN
All types of internet users—home users, startups, small and large businesses—stand to benefit from using a VPN. It secures internet communications and minimizes data theft incidents.
Here are some use cases for small businesses:
- You have a remote workforce: You may have employees or freelance staff working from different geographic locations. Monitoring their online activities and granting them secure access to your IT network can pose a challenge.
- You support a BYOD policy: Eighty-five percent of organizations offer BYOD options to employees. While these policies reduce a company’s infrastructure costs, they increase the security risks. Out of office, employees may connect their devices to unsecured networks, which exposes your data.
- Your employees travel to client locations: Your employees may travel to client locations to close deals or to carry out after-sales work or consulting. While on location, they’ll require access to your private business network. They may also have to work while traveling, and using public Wi-Fi at airports and hotels increases security risks.
- You simply want to secure communications and browsing: While an increasing number of websites are upgrading to HTTPS, several others still rely on HTTP. Your employees may easily land on one of these web pages while browsing, potentially exposing sensitive data such as passwords and business details.
A PCMag survey identifies what motivates most users to turn to VPN technology:
VPN offers many benefits, few drawbacks
Installing a VPN secures your communications, improves privacy, and lets you bypass georestrictions.
Benefits of Using a VPN
- Enhanced data security: A VPN increases the security of your web sessions by passing your data through a secure tunnel as well as encrypting it. Some VPNs can also detect malware in files downloaded from the internet and provide warnings.
- Better online privacy: Internet privacy is a major issue today. A VPN helps to mask your identity by providing you with new IP addresses when browsing online. Encryption of transmitted data further improves data privacy by ensuring that prying eyes on the internet are not be able to read your data.
- Ability to bypass geoblocking: Some websites or databases that support your business operations may not be directly accessible from your country. A VPN will bypass geoblocking by obscuring your access request to appear to be originating from an IP address that’s in an unrestricted location.
- Affordability: VPNs are security tools that make your internet experience safer at an average cost of less than $10 per month. A single VPN subscription or license usually supports between three and 10 devices. Most VPN software vendors also offer multiyear plans at lower rates per month.
There are no particular disadvantages to using VPNs, but they could slow down your browsing because of the extra steps involved in encrypting data requests and transmitting them to additional (VPN) servers.
You can get around this by switching off the VPN. However, it is recommended that you use the VPN during certain browsing activities, especially when accessing public Wi-Fi or sending confidential data.
Key features of VPN software
When shortlisting VPN software, look for the following key features.
|Kill switch||Instantly blocks your device or selected programs from exchanging data over the internet when the VPN connection drops.|
|Peer-to-peer support||Supports peer-to-peer (P2P) traffic by connecting to a P2P server. A P2P network is a self-organized network in which each connected device functions as a client and a server simultaneously.|
|Anonymous browsing||Conceals your location and other personal details by changing IP addresses, concealing search activity, and connecting to the internet through remote third-party servers.|
|DNS leak protection||Ensures that all DNS requests are routed through the VPN and not via the ISP’s DNS server.|
|Remote access||Allows employees to connect to an organization’s private network from remote locations securely.|
|Encryption||Encrypts your data requests to ensure that only your VPN client and server can read them. Commonly used encryption protocols include IPsec (IPSec uses cryptography to encrypt and authenticate the traffic flowing between points of interest), OpenVPN, and 256-bit encryption.|
Additional things to look out for in VPN software:
- Multiple server locations: The more countries your VPN provider has servers in, the more IP addresses you’ll have. This will improve the software’s geobypassing capabilities. More servers will also reduce internet traffic and improve browsing speed.
- No-log policy: Ensuring that your VPN provider doesn’t log your online activities is important to maintain data privacy. Logging details are governed by state- or country-specific laws and may be mandated in some places. Check with your VPN provider for more details.
- Mobile apps: With managing business processes on smartphones and tablets becoming ubiquitous, your VPN must extend the security umbrella to cover mobile devices. Check for the availability of iOS, Android, and Windows apps of your preferred VPN software.
According to a survey by PCMag, small businesses are most concerned about the speed of the VPN service and price of the tool. The number of servers and compatibility are other parameters they look at.
3 examples of VPN software
Below we list (in alphabetical order) the three VPN software products with the highest average customer reviews on GetApp (as of April 2019):
1. GOOSE VPN
Starting at $12.99 per month, Goose VPN offers features such as 256-bit encryption, kill switch, support for IPSec, and no log policy. The software also helps users avoid bandwidth throttling by ISPs. GOOSE VPN works on all types of devices and operating systems, including Windows, Mac, Android, and iOS.
Priced at $11.95 per month, NordVPN is a cloud security service that offers features such as 256-bit encryption, kill swtich, DNS leak protection, no-log policy, and activity management.
Adjusting the settings in NordVPN
Priced at $10 per month, PureVPN is a P2P-enabled VPN service that offers secure file-sharing, 256-bit encryption, internet kill switch, DDoS protection, and eliminates ISP throttling. The tool helps to mask IP addresses, prevent DNS leaks, and block adware. The software works on multiple device types, including smart TVs, PCs, mobile phones, and routers.
Different connection modes offered in PureVPN
Next steps: Set up your VPN right away
If you don’t have a VPN yet, don’t wait for a data breach to happen: Sign up for VPN software immediately. Our directory of VPN software solutions can help you shortlist vendors.
Once you set up your VPN, you must encourage your employees to do all business work over the internet through the VPN. If your employees keep the VPN switched off most of the time, it will not help secure their online activities.
If you already have VPN software and are seeking an upgrade, check out VPN tools that offer faster browsing and support modern encryption features such as SSL and L2TP.